Search Header Logo

Application System: Risks and Control Quiz

Authored by Mylene Quiros

History

University

Application System: Risks and Control Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common risk associated with application systems?

Insufficient documentation for end users

Lack of user authentication mechanisms

Overabundance of data redundancy

Data concentration leading to increased reliance on a single piece of data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common risk associated with ERP Enterprise Resource Planning systems?

Overemphasis on data decentralization

Lack of integration with other IT systems

Inadequate storage capacity for critical data

Processing errors impacting multiple functions due to shared information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a preventative measure for erroneous data input in application systems?

Increasing the number of data repositories

Built-in application controls like check digits and double entry

Allowing open access to all users for data modification

Implementing weak information security measures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of unauthorized remote access to application systems?

Sensitive and confidential information being at risk

Enhanced data accuracy and integrity

Improved network performance

Decreased user productivity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is insufficient documentation a risk for application systems?

It hinders effective analysis of program changes and troubleshooting

It increases data redundancy

It enhances user understanding of the system

It improves system maintainability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common risk associated with inaccurate information in application systems?

Excessive data accuracy leading to confusion

Management failing to use information properly

Lack of user access to information

Overreliance on outdated data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can organizations combat unauthorized remote access to application systems?

Using encryption for user IDs and passwords transmitted over public lines

Providing unrestricted access to all users

Allowing unencrypted transmission of confidential data

Avoiding user access reviews

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?